Server: Windows 2016 Standard with NPS installed and configured Hardware: Fortigate 60D with FortiOS 6.0.4 (LAN IP: 10.1.18.1) Scenario: Switched to a Fortigate 60D from an old DrayTek 2120 router. After the change, RADIUS authentication doesn’t work externally, but works fine on the local network. RADIUS is used to connect to a service called eduroam to get WiFi access on campuses etc and authenticate users on the local AD.
IPv4 Policies has been created and I am able to see traffic passing through the policy and receive data to the NPS server. When a user tries to connect, following error messages appear on the NPS server:
Configuration 1: Fortigate forwards UDP traffic and generates the following error on the NPS server:
Error: “A RADIUS message was received from the invalid RADIUS client IP address 10.1.18.1.”
I don’t know why the Fortigate is regarded as a RADIUS client.
Configuration 2: Fortigate forwards UDP traffic and is configured as a RADIUS client with a shared secret on the NPS server. Following error is generated: “An Access-Request message was received from RADIUS client 10.1.18.1 with a Message-Authenticator attribute that is not valid.”
Seems to me like a mismatch of the shared secret. I haven’t found anywhere where I can enter the shared secret on the Fortigate, except on User & Device \ RADIUS Servers. Afaik, RADIUS Servers section on the device are not used for this scenario.
What am I missing here? Are the UDP packets manipulated on the Fortigate device before being passed on to the NPS server? I’m out of ideas. Any advice is greatly appreciated!
Kind regards,
Peter
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Hi Peter,
here is an answer: https://cookbook.fortinet.com/wifi-with-wsso-using-windows-nps-and-fgt-groups-54/
Jirka
The FGT is always acting as a RADIUS client, it does not have the functionality to serve as a RADIUS server (alas). As it is forwarding a client's request to the NPS, it's acting as a client (kind of proxy, if you like).
As clients have to be authorized, you specify the username and password for RADIUS access in the 'RADIUS server' setup.
Jirka's link really shows all that there is to this.
Thank you for your help. The solution was very simple: turn off NAT.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1731 | |
1105 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.